Archive | Countermeasures




Which Browser Users Are More Secure?

Some new statistics just came out regarding Browser Security, this is more in terms of which users are most likely to apply patches and be using the most secure version. I would have thought Firefox would have been pretty high since the newer series prompt automatically new patches. My only guess is a lot of […]

Tags: , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities | Add a Comment

NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance

You might remember a while ago we mentioned MP3 spam, which in October last year was the latest evolution in spam. Currently there is a new type annoying mail-server owners the world over, it’s known as NDR or Backscatter Spam and involved NDRs or Non Delivery Reports (those emails you get when you send a […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Spammers & Scammers | Add a Comment

ArpON – ARP Handler Detect and Block ARP Poisoning/Spoofing

ArpON (Arp handler inspectiON) is a portable handler daemon with some nice tools to handle all ARP aspects. It has a lot of features and it makes ARP a bit safer. This is possible using two kinds of anti Arp Poisoning tecniques, the first is based on SARPI or “Static ARP Inspection”, the second on […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Network Hacking | Add a Comment

AV Firms Split Over Defcon Contest

Now this is a pretty interesting contest from the guys at Defcon, antivirus evasion! It’s a question that gets asked a LOT…how do I avoid AV? There are various ways to do it and I’ll be interested to see which are used in the contest, the most elegant solutions of course get better prizes. Security […]

Tags: , , , , , , , , , , , , ,

Posted in: Countermeasures, Events/Cons, Malware | Add a Comment

HDIV – Java Web Application Security Framework

HDIV (HTTP Data Integrity Validator) is a Java Web Application Security Framework. HDIV extends web applications’ behaviour by adding Security functionalities, maintaining the API and the framework specification. This implies that we can use HDIV in applications developed in Struts 1.x, Struts 2.x, Spring MVC and JSTL in a transparent way to the programmer and […]

Tags: , , , , , , ,

Posted in: Countermeasures, Web Hacking | Add a Comment

WSGW – Web Security Gateway for Secure Apache

The Web Security Gateway is a security-centric distribution of the Apache web server, bundled with additional security modules, and configured as a front-end (reverse) HTTP proxy. The goal is to mirror most of the features of commercial web application “firewalls”, with free and Open-Source software. The Web Security Gateway provides a configurable caching, authentication, input […]

Tags: , , , , , , , , , , , ,

Posted in: Countermeasures, Web Hacking | Add a Comment

.NETIDS – .NET Intrusion Detection System

This tool is another one on the side of protection, again for web-based applications but this time for .NET applications it’s called .NETIDS (.NET Intrusion detection System). This tool is capable of detecting on attacks on web applications and gives the developer the possibility to react. The project files include filter rules and function stubs […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Countermeasures, Programming, Security Software | Add a Comment

Cyber Storm II – US, UK & 3 Others Involved in Mock Cyberwar

This is pretty interesting – US, UK, Canada, Australia and New Zealand are taking part in a fictitious cyberwar as an exercise to prepare and plan for sustained cyber attacks including some of which have actually caused power outages. I personally think it’s a great idea, I must have missed Cyber Storm I as this […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, General Hacking | Add a Comment

SCARE – Source Code Analysis Risk Evaluation Tool

The Source Code Analysis Risk Evaluation project is a study to create a security complexity metric that will analyze source code and provide a realistic and factual representation of the potential of that source code to create a problematic binary. This metric will not say that the binary will be exploited nor does it do […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities, Programming | Add a Comment

laptop and data theft protection

A UK firm Virtuity has created data protection software called BackStopp which comes with ’self-destruct’ technology based on Wi-Fi and RFID tags that starts to run as and when a laptop is moved from its designated space. So in layman’s terms, if the laptop is moved from its permitted zone (which is set by the […]

Tags: , , ,

Posted in: Countermeasures, Forensics, Privacy | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·